Sciweavers

244 search results - page 16 / 49
» Generalized penetration depth computation
Sort
View
ISPAN
1997
IEEE
13 years 11 months ago
A New General Purpose Parallel Database System
This paper is concerned with the transparent parallelisation of declarative database queries, based on theoretical principles. We have designed an entire database architecture sui...
Mohamad Afshar, J. Bates, Gavin M. Bierman, K. Moo...
ICCV
2001
IEEE
14 years 9 months ago
Segmentation with Pairwise Attraction and Repulsion
We propose a method of image segmentation by integrating pairwise attraction and directional repulsion derived from local grouping and figure-ground cues. These two kinds of pairw...
Stella X. Yu, Jianbo Shi
ICMB
2006
IEEE
138views Business» more  ICMB 2006»
14 years 1 months ago
me-Commerce: An Infrastructure for Personal Predictive Mobile Commerce
Given mobile phone penetration statistics and current mobile phone technical specifications, it is apparent that in developed countries, the majority of citizens carry not just mo...
Andreas Komninos, Peter Barrie, Julian Newman, Stu...
INFOSECCD
2006
ACM
14 years 1 months ago
Is attack better than defense?: teaching information security the right way
A recent trend in security education is towards teaching offensive techniques which were originally developed by hackers. This reflects tendencies in the professional world where ...
Martin Mink, Felix C. Freiling
SIGMOD
2008
ACM
117views Database» more  SIGMOD 2008»
13 years 6 months ago
Jim Gray at Berkeley
Jim Gray spent a decade as a student and researcher at Berkeley. In action, he is remembered for his breath, his depth, and his generosity. Categories and Subject Descriptors K.1 ...
Michael A. Harrison